Cryptanalysis of the GPRS encryption algorithms GEA-1 and GEA-2
From MaRDI portal
Publication:2056728
DOI10.1007/978-3-030-77886-6_6zbMATH Open1479.94125OpenAlexW3167202156MaRDI QIDQ2056728FDOQ2056728
Authors: Christof Beierle, Patrick Derbez, Gregor Leander, Gaëtan Leurent, Håvard Raddum, Yann Rotella, David Rupprecht, Lukas Stennes
Publication date: 8 December 2021
Full work available at URL: https://doi.org/10.1007/978-3-030-77886-6_6
Recommendations
- Refined cryptanalysis of the GPRS ciphers GEA-1 and GEA-2
- scientific article; zbMATH DE number 1759258
- A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony
- Advances in Cryptology - CRYPTO 2003
- Instant ciphertext-only cryptanalysis of GSM encrypted communication
Cites Work
- Title not available (Why is that?)
- Algebraic coding theory
- On ``bent functions
- A family of difference sets in non-cyclic groups
- Shift-register synthesis and BCH decoding
- Title not available (Why is that?)
- A $T = O(2^{n/2} )$, $S = O(2^{n/4} )$ Algorithm for Certain NP-Complete Problems
- Hybrid approach for solving multivariate systems over finite fields
- Title not available (Why is that?)
- Fast exhaustive search for polynomial systems in \({\mathbb{F}_2}\)
- Advances in Cryptology - CRYPTO 2003
- Rebound distinguishers: results on the full Whirlpool compression function
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
- Meet-in-the-middle preimage attacks on AES hashing modes and an application to Whirlpool
- Improved Meet-in-the-Middle Attacks on Reduced-Round DES
- Selected areas in cryptography. 17th international workshop, SAC 2010, Waterloo, Ontario, Canada, August 12--13, 2010. Revised selected papers
- Cryptanalysis of Luffa v2 components
- Cryptanalysis of the FLIP family of stream ciphers
Cited In (9)
- A low data complexity attack on the GMR-2 cipher used in the satellite phones
- Automated meet-in-the-middle attack goes to Feistel
- Meet-in-the-middle preimage attacks on sponge-based hashing
- Falling into bytes and pieces -- cryptanalysis of an Apple patent application
- Refined cryptanalysis of the GPRS ciphers GEA-1 and GEA-2
- Frequency characteristics of sequences generated by the stream encryption algorithm GEA-1
- \texttt{HAWKEYE} -- recovering symmetric cryptography from hardware circuits
- Time-memory trade-offs sound the death knell for GPRS and GSM
- Constructing and deconstructing intentional weaknesses in symmetric ciphers
Uses Software
This page was built for publication: Cryptanalysis of the GPRS encryption algorithms GEA-1 and GEA-2
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2056728)